Journal: Inf. Sci.

Volume 178, Issue 5

1263 -- 1278Yu-Chu Tian, David Levy. Compensation for control packet dropout in networked control systems
1279 -- 1292Alexandru Mihai Bica. Error estimation in the approximation of the solution of nonlinear fuzzy Fredholm integral equations
1293 -- 1308Ali Abbasi Molai, Esmaile Khorram. An algorithm for solving fuzzy relation equations with max-T composition operator
1309 -- 1324Tofigh Allahviranloo, E. Ahmady, N. Ahmady. Nth-order fuzzy linear differential equations
1325 -- 1333Yau-Tarng Juang, Yun-Tien Chang, Chih-Peng Huang. Design of fuzzy PID controllers using modified triangular membership functions
1334 -- 1342Wenyi Zeng, Ping Guo. Normalized distance, similarity measure, inclusion measure and entropy of interval-valued fuzzy sets and their relationship
1343 -- 1354Osman Kazanci, Bijan Davvaz. On the structure of rough prime (primary) ideals and rough fuzzy prime (primary) ideals in commutative rings
1355 -- 1371Wei-Zhi Wu. Attribute reduction based on evidence theory in incomplete decision systems
1372 -- 1390Ki K. Lee, Wan C. Yoon. A classifier learning system using a coevolution method for deflection yoke misconvergence pattern classification problem
1391 -- 1406Yong Wang, Xiaofeng Liao, Di Xiao, Kwok-Wo Wong. One-way hash function construction based on 2D coupled map lattices
1407 -- 1417Hsi-Chung Lin, Sung-Ming Yen, Yi-Hsiung Huang. Security reconsideration of the Huang-Wang nominative signature
1418 -- 1421Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci. An attack on a payment scheme